Shin et al., 2022 - Google Patents
Forensic analysis of note and journal applicationsShin et al., 2022
- Document ID
- 8727801507884066864
- Author
- Shin S
- Kim G
- Kim S
- Kim J
- Publication year
- Publication venue
- Forensic Science International: Digital Investigation
External Links
Snippet
As the rate of smartphones into the general population has increased, apps that provide a wide range of functions have been developed. The usage records can remain within the app, and are a significant target for analysis from a digital forensic perspective. However …
- 238000004374 forensic analysis 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12041166B2 (en) | Protecting data using controlled corruption in computer networks | |
| Gasti et al. | On the security of password manager database formats | |
| US9191811B2 (en) | Method and system for managing information on mobile devices | |
| US20200145389A1 (en) | Controlling Access to Data | |
| CA3156555C (en) | Cryptographic key management | |
| Park et al. | Research on Note-Taking Apps with Security Features. | |
| Shin et al. | Forensic analysis of note and journal applications | |
| Belenko et al. | “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? | |
| Park et al. | Decrypting password-based encrypted backup data for Huawei smartphones | |
| US10623400B2 (en) | Method and device for credential and data protection | |
| Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
| Hur et al. | Data acquisition methods using backup data decryption of Sony smartphones | |
| Gilbert et al. | Forensic discoverability of ios vault applications | |
| Sreelaja et al. | An image edge based approach for image password encryption | |
| Singh et al. | Enhancing Data Security with KeyGuardian: Application of Fernet for Digital Asset Protection | |
| WO2024157087A1 (en) | Systems and methods for managing and protecting data in computing networks | |
| Maqbali | Strengthening Password-Based Authentication | |
| Husny et al. | Encrypted QR code system | |
| WO2024147078A2 (en) | Self-extracting archive for data protection | |
| WO2023052845A2 (en) | Protecting data using controlled corruption in computer networks | |
| อ ลัน จีน et al. | Strengthening Database Privacy: A Comprehensive Approach Using One Time Pad | |
| Dhanesha et al. | Pollux Alarm Vault | |
| WO2025057190A1 (en) | System and method of tracing call flow data of a user in a network | |
| Chen | Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents | |
| CN119416192A (en) | A personal data security protection method, electronic device and storage medium |